If you discover a security vulnerability in Cloud9, please report it privately to our security team.
Do not create a public GitHub issue for security vulnerabilities.
Email: security@dedaluslabs.ai
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
- Initial response: Within 48 hours
- Status update: Within 5 business days
- Fix timeline: Depends on severity (critical issues prioritized)
- We will acknowledge your report within 48 hours
- We will provide regular updates on our progress
- Once a fix is released, we will publicly credit you (unless you prefer to remain anonymous)
- We request that you do not publicly disclose the vulnerability until we have released a fix
Cloud9 is currently in active development. Security updates will be provided for:
| Version | Supported |
|---|---|
| main | ✅ |
| < 1.0 | ❌ |
Once Cloud9 reaches 1.0, we will maintain security support for the latest major version.
When deploying Cloud9:
- Keep dependencies updated: Regularly run
cargo updateand monitor security advisories - Use TLS: Always enable TLS for client connections in production
- Limit network exposure: Run Cloud9 behind a firewall or VPC
- Monitor logs: Watch for unusual access patterns or errors
- Follow the principle of least privilege: Grant minimal necessary permissions
Cloud9 has not yet undergone a formal security audit. As the project matures, we plan to engage third-party security researchers for comprehensive audits.
For general security questions or concerns: security@dedaluslabs.ai